Past Events › IDnext events
Events Search and Views Navigation
With greater connectivity comes greater cybersecurity risk. Maintaining data integrity requires the enterprise to control data access and use.
Legacy on-premises identity access management systems fail because they are unequipped for the increased connections that require additional internal and external users.
For example, SaaS platforms require access to cloud and data center resources. Learn in this session how a full Cloud based IGA 3.0 service speeds up your digital transformation.
This session is supported by Saviynt.Find out more »
During this IDnext Lunch Break, we will discuss the transformation of the use of RBAC at Makro Nederland.
What ideas are there for applying RBAC? What are the challenges? And how do you get the organisation to use RBAC?
This session is supported by Makro.Find out more »
An anniversary deserves a big party! But these are strange times and the current measures ask for a different kind of celebration as we would like. We will organise a special online event to show appreciation to our partners and supporters.Find out more »
IDnext Lunch Break: Does government give us an identity, or do we yield one of our identities to government?
"Does government give us an identity, or do we yield one of our identities to government?"
Irrespective of whether care, education or taxes are at stake, Identity & Access Management (IAM) is an important issue with regard to government services. In this session, Eric Brouwer explores how IAM is organised at government level and which starting points are taken into account. Those starting points are described in the NORA topic IAM.
This Lunch Break is supported by ICTU.Find out more »
Together with ITDS, SIDN will look at IRMA and recent developments, while further exploring the opportunities of IRMA in the financial sector.
This online Lunch Break is supported by SIDN and ITDS.
Topic of this IDnext Lunch Break is "You shall not pass! On identity and access control in distributed systems."
In this presentation we'll explore a distributed, scalable model for API security, identity and authorization policy enforcement in a microservice environment.
This online Lunch Break is supported by Styra.
This IDnext Lunch Break is about:
Privacy, Security and User Centric design. Keyshake has designed and developed technology that keeps consumers in control of all their personal data. At all times. By using Keyshake, a consumer can safely and rapidly identify themselves and transfer personal data, a ticket or other verified attributes.
This IDnext Lunch Break is supported by Keyshake.Find out more »
Topic of this Lunch Break is: "Privileged Access Cloud Security: Insider Tips and Best Practices"
Join Thycotic as they explain a practical approach to help you define and implement privileged access cloud security best practices.
This Lunch Break is supported by Thycotic.
Topic of this Lunch Break is:
"The outlines of the new data economy – from reflection to action". We sketch the outlines of the new emerging data sharing economy where data sovereignty of individuals is the standard. And where companies and organizations request controllable consent to their customers, citizens or patients. We share and demo two use-cases we are currently testing.
Speakers of this IDnext Lunch Break are:
Peter Eikelboom - Innovation Manager at Volksbank
Marie-José Hoefmans - Co-founder Schluss
Please note that the language of this Lunch Break is Dutch.
This Lunch Break is supported by De Volksbank and Schluss.Find out more »
Topic of this IDnext Lunch Break is
"Digital Strategic Autonomy". Strategic autonomy (in short, the capabilities and capacities to realise and safeguard sovereignty) is a top theme in EU policy and politics. Digital strategic autonomy is how this theme is applied in the digital domain. This IDnext Lunch Break is supported by iivii.Find out more »